::-> Background Our Mission Our Activities or better to say Pak Fucking > Read More
:: Yaha.J R0xx coded and launched Yaha.J worm. It was coded for educational purpose and test of skill only and not to launch any serious attack with mail spamming components added to it. >> Read More
:: Yaha.K
aka Yaha.M R0xx coded and launched the Yaha.K worm. This worm contained DDoS (Distributed Denial of Service) components against http://www.infopak.gov.pk,the then main government website of Pakistan. The Yaha.K worm rated among top 5 virus by various AV companies including messagelabs.com blocked http://www.infopak.gov.pk within 10 days of its launch. >> Read More
:: Yaha.P
aka Yaha.Q Though apparently it was launched accidentally in BETA stage during testing process but it earned quite popularity for us and brough to public about our mission and what we stand for.The original version of Yaha.P will be released very soon...
Analysis
Time of India on Yaha.P
Geek News on Yaha.P
Antivirus.com on Yaha.P
BBC on Yaha.P
Rediff.com on Yaha.P
要檢查您的連線設定,請按[工具]功能表,然後按[網際網路選項]。在[連線]標籤按[區域網路設定]。 設定應符合區域網路 (LAN) 系統管理員或網際網路服務提供者 (ISP) 提供的設定。
如果您的網路管理員已經啟用此功能, Microsoft Windows 將檢定並自動尋找網路連線設定。
要 Windows 尋找設定,請按 [偵測網路設定]